]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
tree-wide: drop doubled empty lines
authorYu Watanabe <watanabe.yu+github@gmail.com>
Mon, 7 Oct 2024 03:47:57 +0000 (12:47 +0900)
committerDaan De Meyer <daan.j.demeyer@gmail.com>
Mon, 7 Oct 2024 07:51:37 +0000 (09:51 +0200)
62 files changed:
hwdb.d/60-keyboard.hwdb
src/analyze/analyze-plot.c
src/basic/ansi-color.h
src/basic/capability-util.c
src/basic/confidential-virt.c
src/basic/filesystems.c
src/basic/recurse-dir.c
src/basic/xattr-util.h
src/core/load-fragment.c
src/core/socket.c
src/cryptenroll/cryptenroll.c
src/home/homectl.c
src/home/homed-manager-bus.c
src/home/homed-manager.c
src/home/homework-fscrypt.c
src/home/homework-luks.c
src/hostname/hostnamectl.c
src/import/importctl.c
src/integritysetup/integrity-util.c
src/integritysetup/integrity-util.h
src/journal/journald-stream.c
src/libsystemd-network/sd-dhcp-client.c
src/libsystemd-network/test-acd.c
src/libsystemd/sd-bus/bus-message.c
src/libsystemd/sd-event/sd-event.c
src/libsystemd/sd-journal/journal-def.h
src/login/loginctl.c
src/machine/machined-core.c
src/network/netdev/ipoib.c
src/network/networkd-address-generation.c
src/network/networkd-neighbor.c
src/network/networkd-queue.h
src/network/networkd-radv.c
src/nspawn/nspawn.c
src/nss-systemd/userdb-glue.c
src/partition/repart.c
src/pcrlock/pcrlock.c
src/resolve/resolved-dns-answer.c
src/resolve/resolved-dns-question.c
src/resolve/resolved-dns-rr.c
src/resolve/resolved-mdns.c
src/resolve/test-dnssec.c
src/shared/bpf-compat.h
src/shared/bpf-program.c
src/shared/creds-util.c
src/shared/firewall-util-nft.c
src/shared/id128-print.c
src/shared/logs-show.c
src/shared/tests.h
src/shared/userdb.c
src/ssh-generator/ssh-generator.c
src/systemctl/systemctl-util.c
src/sysupdate/sysupdate.c
src/test/test-async.c
src/test/test-barrier.c
src/test/test-bpf-devices.c
src/test/test-execute.c
src/test/test-fileio.c
src/test/test-install-root.c
src/test/test-varlink-idl.c
src/test/test-varlink.c
src/udev/udev-builtin-blkid.c

index 798529cd10b5cacc0589d67a2c80c1c692baf9cb..4d5f6b4bebd8efc39cbf22b824a2faa3fac482d4 100644 (file)
@@ -1435,7 +1435,6 @@ evdev:input:b0003v046DpC309*
  KEYBOARD_KEY_c01b6=images                              # My Pictures (F11)
  KEYBOARD_KEY_c01b7=audio                               # My Music (F12)
 
-
 ###########################################################
 # Maxdata
 ###########################################################
@@ -1920,7 +1919,6 @@ evdev:atkbd:dmi:bvn*:bvr*:bd*:svn[sS][aA][mM][sS][uU][nN][gG]*:sku*SCAI*:*
  KEYBOARD_KEY_a9=!unknown                               # Fn+F12 Fn lock Off - handled by hardware
  KEYBOARD_KEY_8f=!battery                               # Notification that battery has met charge control end threshold
 
-
 ###########################################################
 # SONY
 ###########################################################
index d14c40de60f7301a54193686778342796b75af4c..5e33f6240483fdf039b683f35dc0b91f72d969cc 100644 (file)
@@ -33,7 +33,6 @@
 #define svg_timestamp(b, t, y) \
         svg_text(b, t, y, "%u.%03us", (unsigned)((t) / USEC_PER_SEC), (unsigned)(((t) % USEC_PER_SEC) / USEC_PER_MSEC))
 
-
 typedef struct HostInfo {
         char *hostname;
         char *kernel_name;
index efc1dea1314ecc3a27b052c12dc5a6824a8e715c..5f1418109c83b1aceafeaafa68039b00ca083225 100644 (file)
@@ -102,7 +102,6 @@ static inline const char* ansi_add_underline_grey(void) {
                         colors_enabled() ? ANSI_##NAME : "";            \
         }
 
-
 #define DEFINE_ANSI_FUNC_UNDERLINE_256(name, NAME, FALLBACK)                                                        \
         static inline const char* ansi_##name(void) {                                                               \
                 switch (get_color_mode()) {                                                                         \
index e9b41fe7915d2324b7a39817cbc450bb822e0fc8..47bb381a6c2c5bc73468ac91630e1c7e48fa4b18 100644 (file)
@@ -637,7 +637,6 @@ int capability_get_ambient(uint64_t *ret) {
                         a |= UINT64_C(1) << i;
         }
 
-
         *ret = a;
         return 1;
 }
index c246636c7c12e2e5a5d01505c13fa7d733633ce5..986a57e046230a1b1fc2f2a8626354434ea691c8 100644 (file)
@@ -16,7 +16,6 @@
 #include "string-table.h"
 #include "utf8.h"
 
-
 #if defined(__x86_64__)
 
 static void cpuid(uint32_t *eax, uint32_t *ebx, uint32_t *ecx, uint32_t *edx) {
index aff1791c1d14d82ee87abf956cb202249771487c..05ff75cd5d4e319d2adb431283e8ce9c6954a79e 100644 (file)
@@ -12,7 +12,6 @@ const char* fs_type_to_string(statfs_f_type_t magic) {
         return NULL;
 }
 
-
 int fs_type_from_string(const char *name, const statfs_f_type_t **ret) {
         const struct FilesystemMagic *fs_magic;
 
index 776733148b054861369baacc9b579456077d299a..378fd92b06175a1f16973de12135d30b5a23539e 100644 (file)
@@ -471,7 +471,6 @@ int recurse_dir(
                                  statx_mask != 0 ? &sx : NULL, /* only pass sx if user asked for it */
                                  userdata);
 
-
                 if (r == RECURSE_DIR_LEAVE_DIRECTORY)
                         break;
                 if (!IN_SET(r, RECURSE_DIR_SKIP_ENTRY, RECURSE_DIR_CONTINUE))
index 19ee3e1c45255ba47ce7e9308595a01a8cec7091..17c3684280a2c7b0b8997c0e005e604e4e89ef5f 100644 (file)
@@ -27,7 +27,6 @@ static inline int fd_getcrtime(int fd, usec_t *ret) {
         return fd_getcrtime_at(fd, NULL, 0, ret);
 }
 
-
 int listxattr_at_malloc(int fd, const char *path, int flags, char **ret);
 static inline int listxattr_malloc(const char *path, char **ret) {
         return listxattr_at_malloc(AT_FDCWD, path, AT_SYMLINK_FOLLOW, ret);
index cf499383f5f9b52b56427ef07b006cb970c2e95f..107b55d8ecc099b6cb7945d375893fd9f3a18cbf 100644 (file)
@@ -176,7 +176,6 @@ int config_parse_cpu_shares(
         assert(lvalue);
         assert(rvalue);
 
-
         log_syntax(unit, LOG_WARNING, filename, line, 0,
                    "Unit uses %s=; please use CPUWeight= instead. Support for %s= will be removed soon.",
                    lvalue, lvalue);
index 0701780f038d29096d12a308bb9eae539932c381..8519aefa68916c5f32d21f4678f5468adac1307d 100644 (file)
@@ -664,7 +664,6 @@ static void socket_dump(Unit *u, FILE *f, const char *prefix) {
                         "%sFlushPending: %s\n",
                          prefix, yes_no(s->flush_pending));
 
-
         if (s->priority >= 0)
                 fprintf(f,
                         "%sPriority: %i\n",
index ad98acb76246c85eac0c1389da50b878c821a1da..a205f59dcc3602b7d9ef793eb85efe19c9ca3c07 100644 (file)
@@ -504,7 +504,6 @@ static int parse_argv(int argc, char *argv[]) {
                                 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
                                                        "Multiple operations specified at once, refusing.");
 
-
                         r = parse_path_argument(optarg, /* suppress_root= */ false, &arg_tpm2_device_key);
                         if (r < 0)
                                 return r;
index 87961a2f2227494cd154849aab186fbd8d9dfc04..ced4b198dedda72e20882051f15368da13be15ba 100644 (file)
@@ -183,7 +183,6 @@ static int list_homes(int argc, char *argv[], void *userdata) {
                 if (r < 0)
                         return table_log_add_error(r);
 
-
                 r = table_add_cell(table, &cell, TABLE_STRING, state);
                 if (r < 0)
                         return table_log_add_error(r);
index 58cd0371057575d6559f25c3884650a1fbd77d87..69c7680b9e563e3bc2967d2e5768e0f284a24193 100644 (file)
@@ -485,7 +485,6 @@ static int method_unregister_home(sd_bus_message *message, void *userdata, sd_bu
         return generic_home_method(userdata, message, bus_home_method_unregister, error);
 }
 
-
 static int method_create_home(sd_bus_message *message, void *userdata, sd_bus_error *error) {
         _cleanup_(user_record_unrefp) UserRecord *hr = NULL;
         _cleanup_hashmap_free_ Hashmap *blobs = NULL;
index 8a4544b269aa83aea56867d429328c1598838f49..6f5b6feda2da268d27d7299d256fe1f833d7a7d6 100644 (file)
@@ -1998,7 +1998,6 @@ static int manager_rebalance_calculate(Manager *m) {
                                                     1 * USEC_PER_MINUTE,
                                                     15 * USEC_PER_MINUTE);
 
-
         log_debug("Rebalancing interval set to %s.", FORMAT_TIMESPAN(m->rebalance_interval_usec, USEC_PER_MSEC));
 
         /* Let's suppress small resizes, growing/shrinking file systems isn't free after all */
index 92ce5c39ba202c566f29ac931a17183b9ddbcfe8..3a9d4ea8918a4da09e83fbe2f35a25586fa9083c 100644 (file)
@@ -187,7 +187,6 @@ static int fscrypt_slot_try_one(
                 const uint8_t match_key_descriptor[static FS_KEY_DESCRIPTOR_SIZE],
                 void **ret_decrypted, size_t *ret_decrypted_size) {
 
-
         _cleanup_(EVP_CIPHER_CTX_freep) EVP_CIPHER_CTX *context = NULL;
         _cleanup_(erase_and_freep) void *decrypted = NULL;
         uint8_t key_descriptor[FS_KEY_DESCRIPTOR_SIZE];
index 7c3be8dd9a4e77d19cedc3318966782ac7cf6b8b..4b73bd779d6a2ea5660894a037508b847efa2a42 100644 (file)
@@ -728,7 +728,6 @@ static int luks_validate(
                 if (!streq_ptr(blkid_partition_get_name(pp), label))
                         continue;
 
-
                 r = blkid_partition_get_uuid_id128(pp, &id);
                 if (r < 0)
                         log_debug_errno(r, "Failed to read partition UUID, ignoring: %m");
index 1f98c975fe8821496d6fb6f88f2d63bfca8dad75..ac787b59b572aadda48631630f3c3b19a4c7e8fc 100644 (file)
@@ -519,7 +519,6 @@ static int show_status(int argc, char **argv, void *userdata) {
         return show_all_names(bus);
 }
 
-
 static int set_simple_string_internal(sd_bus *bus, sd_bus_error *error, const char *target, const char *method, const char *value) {
         _cleanup_(sd_bus_error_free) sd_bus_error e = SD_BUS_ERROR_NULL;
         int r;
index 85903bb8c69c9ca52dbd2d5021173dca4fa6a430..6bf63916f8242db02d6be813b1955f54df002aab 100644 (file)
@@ -475,7 +475,6 @@ static int import_fs(int argc, char *argv[], void *userdata) {
         if (r < 0)
                 return bus_log_create_error(r);
 
-
         return transfer_image_common(bus, m);
 }
 
index bc0fc645d06cb16e033215ceb6004092e71dcfea..69f55c256d552198b018c137a1c1d080e7f96edb 100644 (file)
@@ -6,7 +6,6 @@
 #include "path-util.h"
 #include "percent-util.h"
 
-
 static int supported_integrity_algorithm(char *user_supplied) {
         if (!STR_IN_SET(user_supplied, "crc32", "crc32c", "xxhash64", "sha1", "sha256", "hmac-sha256"))
                 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Unsupported integrity algorithm (%s)", user_supplied);
index b27975c7dbb3801df5d5f2b5bc80d01787c92309..359d2556a4892ae9044b4f9631ae7589d2121ae1 100644 (file)
@@ -6,7 +6,6 @@
 #include "cryptsetup-util.h"
 #include "time-util.h"
 
-
 int parse_integrity_options(
                 const char *options,
                 uint32_t *ret_activate_flags,
index e8437e3af4337ccbe9e037e1b64fb693675a4861..b019eda0d2fa93bf7fb3bd689b7442279d16c299 100644 (file)
@@ -508,7 +508,6 @@ static int stdout_stream_scan(
         assert(s);
         assert(p);
 
-
         for (;;) {
                 LineBreak line_break;
                 size_t skip, found;
index 41638ac7150e64461bbea944719fde2b6b94e5e8..cf26bd0e487cfa5ea19d6d197d679b30ff2b1a4e 100644 (file)
@@ -984,7 +984,6 @@ static int client_append_common_discover_request_options(sd_dhcp_client *client,
                         return r;
         }
 
-
         return 0;
 }
 
index 6ed7260a72bec8cd0496379e3b3a5466aa6f0e4a..4544cf8a5749141ef4ff38dd2651b20773981612 100644 (file)
@@ -7,7 +7,6 @@
 #include <stdlib.h>
 #include <unistd.h>
 
-
 #include "sd-event.h"
 #include "sd-ipv4acd.h"
 #include "sd-netlink.h"
index 296f450826a3c472299c03ab5badc50ace562478..a3a872778871f2a9920ac68595954689f38c63fd 100644 (file)
@@ -4158,7 +4158,6 @@ static int message_parse_fields(sd_bus_message *m) {
                         if (m->reply_cookie != 0)
                                 return -EBADMSG;
 
-
                         if (!streq(signature, "u"))
                                 return -EBADMSG;
 
index 77d2c116db8fb182aa0fd65db24017be69e198ec..ae1ab2dff9ccfbea800f0456e7a38b2e03fae963 100644 (file)
@@ -1689,7 +1689,6 @@ _public_ int sd_event_add_child_pidfd(
                 sd_event_child_handler_t callback,
                 void *userdata) {
 
-
         _cleanup_(source_freep) sd_event_source *s = NULL;
         pid_t pid;
         int r;
@@ -4925,7 +4924,6 @@ _public_ int sd_event_loop(sd_event *e) {
         assert_return(!event_origin_changed(e), -ECHILD);
         assert_return(e->state == SD_EVENT_INITIAL, -EBUSY);
 
-
         PROTECT_EVENT(e);
 
         while (e->state != SD_EVENT_FINISHED) {
index 07851229f873f28ebe4333c0ab1260c31ced2c34..02576077b0b67c22f5269728631dda32438ac34b 100644 (file)
@@ -188,7 +188,6 @@ enum {
                                               HEADER_INCOMPATIBLE_COMPACT,
 };
 
-
 enum {
         HEADER_COMPATIBLE_SEALED             = 1 << 0,
         HEADER_COMPATIBLE_TAIL_ENTRY_BOOT_ID = 1 << 1, /* if set, the last_entry_boot_id field in the header is exclusively refreshed when an entry is appended */
@@ -201,7 +200,6 @@ enum {
                                                HEADER_COMPATIBLE_TAIL_ENTRY_BOOT_ID,
 };
 
-
 #define HEADER_SIGNATURE                                                \
         ((const uint8_t[]) { 'L', 'P', 'K', 'S', 'H', 'H', 'R', 'H' })
 
index c538b61e0d82135f3809ad21358fa6d994de9836..c323817b4b3a78502b0485574b71e3c457130838 100644 (file)
@@ -621,7 +621,6 @@ static int print_session_status_info(sd_bus *bus, const char *path) {
                         return table_log_add_error(r);
         }
 
-
         if (!isempty(i.seat)) {
                 r = table_add_cell(table, NULL, TABLE_FIELD, "Seat");
                 if (r < 0)
index 0045f75b0ca7d1651e08c2c66e563d9509ee8829..d921dfb27e91ee45548baddd537232c61b9a887e 100644 (file)
@@ -399,7 +399,6 @@ int machine_get_os_release(Machine *machine, char ***ret_os_release) {
                 return -EOPNOTSUPP;
         }
 
-
         *ret_os_release = TAKE_PTR(l);
         return 0;
 }
index e2f879e72205a6017860aabaf7d6550fff4dab53..0065a5452e87ff32312b284ce2b6779806eea5a2 100644 (file)
@@ -138,7 +138,6 @@ int config_parse_ipoib_pkey(
         return 0;
 }
 
-
 const NetDevVTable ipoib_vtable = {
         .object_size = sizeof(IPoIB),
         .sections = NETDEV_COMMON_SECTIONS "IPoIB\0",
index 816cdf713ac5d650376efd2207c8066365ad4320..2663af87f69a929f9ee06d6ada6dcd1c6320e62b 100644 (file)
@@ -153,7 +153,6 @@ static int ipv6_token_type_put_by_addr(Hashmap **tokens_by_addr, const struct in
         return ipv6_token_put_by_addr(tokens_by_addr, addr, token);
 }
 
-
 static int generate_eui64_address(const Link *link, const struct in6_addr *prefix, struct in6_addr *ret) {
         assert(link);
         assert(prefix);
index 87af5e9e62ffdbfa7ce63ff8dd45892c4f25aceb..6bfb6579e1b6feab252c516ab311f9231d0e958c 100644 (file)
@@ -727,7 +727,6 @@ int network_drop_invalid_neighbors(Network *network) {
         return 0;
 }
 
-
 int config_parse_neighbor_section(
                 const char *unit,
                 const char *filename,
index 3289183f2ddabd02998f4a5571a83306caa339b0..b50851ecdd68b65658871c5563b81be2a19f7a56 100644 (file)
@@ -189,7 +189,6 @@ int remove_request_add(
                 _r;                                                     \
         })
 
-
 #define link_remove_request_add(link, data, name, nl, m, handler)       \
         ({                                                              \
                 Link *_link = (link);                                   \
index 652e7845fcea0b722c87dc512ee9c7abe4394dc7..347788eca72b7b8179714c796a99e1428d180cf5 100644 (file)
@@ -881,7 +881,6 @@ void network_adjust_radv(Network *network) {
                 if (prefix_section_verify(prefix) < 0)
                         prefix_free(prefix);
 
-
         RoutePrefix *route;
         HASHMAP_FOREACH(route, network->route_prefixes_by_section)
                 if (route_prefix_section_verify(route) < 0)
index 47eff33e461b726749ecbb0569bbfbce6b3235c5..70ce4e6d7964ba0e542ce124e0e9f49ee91cb321 100644 (file)
@@ -6168,7 +6168,6 @@ static int run(int argc, char *argv[]) {
                 assert(arg_image);
                 assert(!arg_template);
 
-
                 r = chase_and_update(&arg_image, 0);
                 if (r < 0)
                         goto finish;
index b02d89a20bc600c8450fcf53f2a2bdac9599b5b5..61311d8db3f1543f499b30b60cfd3f5e39391a66 100644 (file)
@@ -346,7 +346,6 @@ enum nss_status userdb_getgrgid(
                 size_t buflen,
                 int *errnop) {
 
-
         _cleanup_(group_record_unrefp) GroupRecord *g = NULL;
         _cleanup_strv_free_ char **members = NULL;
         bool from_nss;
index c87cceb4da36d659f905a9a6fb477b5c59ecbf9a..8b51dc8ec52998b48393b95b5d4f5e7ccda47644 100644 (file)
@@ -3877,7 +3877,6 @@ static int context_dump(Context *context, bool late) {
         return 0;
 }
 
-
 static bool context_changed(const Context *context) {
         assert(context);
 
index 502f05ac66d6c4967a559def68a112559b233edb..46f285d54ab694cd4ae87302fac17d47b313bcfc 100644 (file)
@@ -850,7 +850,6 @@ catchall:
                 return log_oom();
         return 1;
 
-
 invalid:
         /* Mark the payload as invalid, so that we do not bother parsing/validating it any further */
         rec->event_payload_valid = EVENT_PAYLOAD_VALID_NO;
index 254f8362d3a9797c2c6c051e96af9400b4d5cf13..d4c3922971993e80a5c2455b14e0f53584244c94 100644 (file)
@@ -663,7 +663,6 @@ void dns_answer_order_by_scope(DnsAnswer *a, bool prefer_link_local) {
                 if (dns_resource_record_is_link_local_address(item->rr) != prefer_link_local)
                         *p++ = dns_answer_item_ref(item);
 
-
         assert((size_t) (p - items) == n);
 
         ordered_set_clear(a->items);
index 18e2fe2485f4053e450ccbf4e062b2d3fcdb4f84..6832a4766c5dd5e89f8b2c435ac3dbbf02092b2f 100644 (file)
@@ -73,7 +73,6 @@ int dns_question_add(DnsQuestion *q, DnsResourceKey *key, DnsQuestionFlags flags
         if (!q)
                 return -ENOSPC;
 
-
         DNS_QUESTION_FOREACH_ITEM(item, q) {
                 r = dns_resource_key_equal(item->key, key);
                 if (r < 0)
@@ -185,7 +184,6 @@ int dns_question_contains_key(DnsQuestion *q, const DnsResourceKey *k) {
         if (!q)
                 return 0;
 
-
         for (j = 0; j < q->n_keys; j++) {
                 r = dns_resource_key_equal(q->items[j].key, k);
                 if (r != 0)
index cc7a5b64b62158697619a7127a088a12d1ee7d0c..bbd0aef1c8015b9902ae4c2555e1b38fdf8a245b 100644 (file)
@@ -2370,7 +2370,6 @@ int dns_resource_record_to_json(DnsResourceRecord *rr, sd_json_variant **ret) {
                                 SD_JSON_BUILD_PAIR("algorithm", SD_JSON_BUILD_UNSIGNED(rr->dnskey.algorithm)),
                                 SD_JSON_BUILD_PAIR("dnskey", SD_JSON_BUILD_BASE64(rr->dnskey.key, rr->dnskey.key_size)));
 
-
         case DNS_TYPE_RRSIG:
                 return sd_json_buildo(
                                 ret,
index 0fb83a3c229492b3aa0df315b6fadd5778adbd30..7e9bb693afec5ccfc38905dc99ae51bc682684c0 100644 (file)
@@ -236,7 +236,6 @@ static bool sender_on_local_subnet(DnsScope *s, DnsPacket *p) {
         return false;
 }
 
-
 static int mdns_scope_process_query(DnsScope *s, DnsPacket *p) {
         _cleanup_(dns_answer_unrefp) DnsAnswer *full_answer = NULL;
         _cleanup_(dns_packet_unrefp) DnsPacket *reply = NULL;
index d325b533eae6b9bab42331a3b002d737deb8b97f..6b0ab66ae7430ffc960d39654aaac83fe7cfa4ee 100644 (file)
@@ -387,7 +387,6 @@ TEST(dnssec_verify_rfc6605_example2) {
                 0xab, 0xf0, 0x8f, 0xe6, 0x95, 0x53, 0x60, 0x17, 0xa5, 0xbf, 0xa9, 0x32, 0x37, 0xee, 0x6e, 0x34,
         };
 
-
         _cleanup_(dns_resource_record_unrefp) DnsResourceRecord *dnskey = NULL, *ds = NULL, *a = NULL,
                 *rrsig = NULL;
         _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL;
index 5a7945cb9bc3e2848ebfeffe7696c0caed26e0de..3d94bf2e05e6f6d9e8e2be3995b566abc7f93846 100644 (file)
@@ -15,7 +15,6 @@
  * compile time is that we can then load either the old or the new symbols at runtime
  * regardless of the version we were compiled with */
 
-
 /* declare the struct for libbpf <= 0.6.0 -- it causes no harm on newer versions */
 struct bpf_map_create_opts;
 
index ac92ec8241099a1a642491ea6685538a0375ff92..05a937cc5026c54435ee9def6439207073da59fa 100644 (file)
@@ -138,7 +138,6 @@ int bpf_program_new_from_bpffs_path(const char *path, BPFProgram **ret) {
         return 0;
 }
 
-
 int bpf_program_add_instructions(BPFProgram *p, const struct bpf_insn *instructions, size_t count) {
 
         assert(p);
index 8cd7c9d7c5067bb847ca4ef73b99adf210efb948..762dfd675a6f8f0404de139074da98233d4edc1d 100644 (file)
@@ -509,7 +509,6 @@ int get_credential_host_secret(CredentialSecretFlags flags, struct iovec *ret) {
                                 return log_debug_errno(errno,
                                                        "Failed to open %s/%s: %m", dirname, filename);
 
-
                         r = make_credential_host_secret(dfd, machine_id, flags, dirname, filename, ret);
                         if (r == -EEXIST) {
                                 log_debug_errno(r, "Credential secret %s/%s appeared while we were creating it, rereading.",
index daf73c5b7b92ee6dd9e7de72212ea94eb7e7ea2f..1e02886430ff1451dd5f32d1e66817d8657cf04f 100644 (file)
@@ -620,7 +620,6 @@ static int nft_add_element(
         assert(key);
         assert(data || dlen == 0);
 
-
         /*
          * Ideally there would be an API that provides:
          *
index c9509b28f0f52051a94c97597e282e14dcd6baea..788be8089ae38907fc37bb8166e3462071c81edc 100644 (file)
@@ -45,7 +45,6 @@ int id128_pretty_print_sample(const char *name, sd_id128_t id) {
         return 0;
 }
 
-
 int id128_pretty_print(sd_id128_t id, Id128PrettyPrintMode mode) {
         assert(mode >= 0);
         assert(mode < _ID128_PRETTY_PRINT_MODE_MAX);
index ec91b43ad56f56704f269fddbac7db61072c0fa3..0b28ce411734197308b0adc81d60763fc88ff678 100644 (file)
@@ -1410,7 +1410,6 @@ typedef int (*output_func_t)(
                 dual_timestamp *previous_display_ts,
                 sd_id128_t *previous_boot_id);
 
-
 static output_func_t output_funcs[_OUTPUT_MODE_MAX] = {
         [OUTPUT_SHORT]             = output_short,
         [OUTPUT_SHORT_ISO]         = output_short,
@@ -1701,7 +1700,6 @@ int add_matches_for_user_unit_full(sd_journal *j, bool all, const char *unit) {
                         (r = sd_journal_add_match(j, "_UID=0", SIZE_MAX))
                 );
 
-
         if (r == 0 && all && endswith(unit, ".slice"))
                 /* Show all messages belonging to a slice */
                 (void) (
index 141bfe4f22d87bfab610163da3d8a1a6cf1b72e3..a7c2600d38354efd997fefd7b8e156f6647e2961 100644 (file)
@@ -331,7 +331,6 @@ static inline int run_test_table(void) {
                 }                                                                                               \
         })
 
-
 #define ASSERT_FAIL(expr)                                                                                       \
         ({                                                                                                      \
                 typeof(expr) _result = (expr);                                                                  \
@@ -535,7 +534,6 @@ static inline int run_test_table(void) {
                 }                                                                                               \
         })
 
-
 #define ASSERT_EQ_ID128(expr1, expr2)                                                                           \
         ({                                                                                                      \
                 typeof(expr1) _expr1 = (expr1);                                                                 \
index a35716c3d539611b99fa67cf9581786e5c08f910..557de70ea8042da5957bd0bf15ca4b8d6cbb4d02 100644 (file)
@@ -911,7 +911,6 @@ int groupdb_by_name(const char *name, UserDBFlags flags, GroupRecord **ret) {
                         return r;
         }
 
-
         if (!FLAGS_SET(flags, USERDB_EXCLUDE_NSS) && !(iterator && iterator->nss_covered)) {
                 r = userdb_iterator_block_nss_systemd(iterator);
                 if (r >= 0) {
index 842f0b3a940017409861cc8a1e1c68d76c0d1296..f4828286354dda962fa432fa089a7dbeac2b439a 100644 (file)
@@ -280,7 +280,6 @@ static int add_local_unix_socket(
         if (r < 0)
                 return r;
 
-
         log_info("Binding SSH to AF_UNIX socket /run/ssh-unix-local/socket.\n"
                  "→ connect via 'ssh .host' locally");
         return 0;
index 0b5881ccbbf629dbc875d36514173ce7a035dde4..118b627e814e6d40807431a6a1f5e8cb618c8f36 100644 (file)
@@ -731,7 +731,6 @@ int unit_exists(LookupPaths *lp, const char *unit) {
         return !streq_ptr(info.load_state, "not-found") || !streq_ptr(info.active_state, "inactive");
 }
 
-
 int append_unit_dependencies(sd_bus *bus, char **names, char ***ret) {
         _cleanup_strv_free_ char **with_deps = NULL;
 
index a80599c796928100a217b955bb08c29d5e191e2e..490466228d1feea10758314963dd6db78c1ad213 100644 (file)
@@ -508,7 +508,6 @@ static int context_show_version(Context *c, const char *version) {
                        FLAGS_SET(us->flags, UPDATE_INSTALLED|UPDATE_PROTECTED) ? ansi_highlight() : "", yes_no(FLAGS_SET(us->flags, UPDATE_INSTALLED|UPDATE_PROTECTED)), ansi_normal(),
                        us->flags & UPDATE_OBSOLETE ? ansi_highlight_red() : "", yes_no(us->flags & UPDATE_OBSOLETE), ansi_normal());
 
-
         t = table_new("type", "path", "ptuuid", "ptflags", "mtime", "mode", "size", "tries-done", "tries-left", "noauto", "ro", "growfs", "sha256");
         if (!t)
                 return log_oom();
@@ -694,7 +693,6 @@ static int context_show_version(Context *c, const char *version) {
         if (!have_sha256)
                 (void) table_hide_column_from_display(t, 12);
 
-
         if (FLAGS_SET(arg_json_format_flags, SD_JSON_FORMAT_OFF)) {
                 printf("%s%s%s Version: %s\n"
                        "    State: %s%s%s\n"
index ee6bae2698ab6567b479d1c5be4fc709cc87cdeb..ed5fec74d37adc2e0fb1c35a7b4688be6b3fc9f8 100644 (file)
@@ -114,5 +114,4 @@ TEST(asynchronous_rm_rf) {
         }
 }
 
-
 DEFINE_TEST_MAIN(LOG_DEBUG);
index 1e0da59c489a902543c63d98f672571f100d8bc3..f965a6c06d6d8caa48f1440a91e2ba5891f872eb 100644 (file)
@@ -415,7 +415,6 @@ TEST_BARRIER(barrier_pending_exit,
         }),
         TEST_BARRIER_WAIT_SUCCESS(pid2));
 
-
 static int intro(void) {
         if (!slow_tests_enabled())
                 return log_tests_skipped("slow tests are disabled");
index 3993c35aa4b0dd09a8bdd3f92aa1457f0b65d88b..ae6be16956b1c39af0edf428159caa541cb02420 100644 (file)
@@ -248,7 +248,6 @@ static void test_policy_empty(bool add_mismatched, const char *cgroup_path, BPFP
         assert_se(wrong == 0);
 }
 
-
 int main(int argc, char *argv[]) {
         _cleanup_free_ char *cgroup = NULL, *parent = NULL;
         _cleanup_(rmdir_and_freep) char *controller_path = NULL;
index b068c3aee071a33077fb6545f0115bbd17e387f4..9e3288b7a9f293818cd3fc3f028944b38ef8c675 100644 (file)
@@ -422,7 +422,6 @@ static void test_exec_execsearchpath_environment_files(Manager *m) {
 
         (void) unlink("/tmp/test-exec_environmentfile.conf");
 
-
         r = write_string_file("/tmp/test-exec_execsearchpath_environmentfile-set.conf", path_set, WRITE_STRING_FILE_CREATE);
         ASSERT_OK(r);
 
index 474eacaf0468df1f25b3657c27cded178815ba5e..d76ef679a180f4b717b15fdc1e31855e49a364fa 100644 (file)
@@ -1147,5 +1147,4 @@ TEST(fdopen_independent) {
         f = safe_fclose(f);
 }
 
-
 DEFINE_TEST_MAIN(LOG_DEBUG);
index 3a623a8761d4ecbac778deafdb198a5599689bbc..090407b8e37ff09b614e98653e92e98bfe3f88c0 100644 (file)
@@ -1327,5 +1327,4 @@ static int intro(void) {
         return EXIT_SUCCESS;
 }
 
-
 DEFINE_TEST_MAIN_WITH_INTRO(LOG_INFO, intro);
index af48216865b263f002a0363802ff44e779e89790..bdac083571924be690827cea52b678e9c0c89176 100644 (file)
@@ -367,7 +367,6 @@ static SD_VARLINK_DEFINE_INTERFACE(
                 &vl_method_TestMethod,
                 &vl_method_Done);
 
-
 static void* server_thread(void *userdata) {
         _cleanup_(sd_varlink_server_unrefp) sd_varlink_server *server = NULL;
         _cleanup_(sd_event_unrefp) sd_event *event = NULL;
index a80344bcd1258598b93e19e73c970dfb1802b275..17a78633cc144ae4bf13cd0f108f5445f586c697 100644 (file)
@@ -260,7 +260,6 @@ static void *thread(void *arg) {
         assert_se(sd_varlink_collect(c, "io.test.DoSomethingMore", wrong, &j, &error_id) >= 0);
         assert_se(strcmp_ptr(error_id, "org.varlink.service.InvalidParameter") == 0);
 
-
         assert_se(sd_varlink_collect(c, "io.test.DoSomethingMore", i, &j, &error_id) >= 0);
 
         assert_se(!error_id);
index 4d130351738ce0909689fb8cae40da53938a95e2..ae9a11f45db9f67c81b572ece8d58775f35c8036 100644 (file)
@@ -307,7 +307,6 @@ static int read_loopback_backing_inode(
         *ret_fname = TAKE_PTR(fn);
         return 1;
 
-
 notloop:
         *ret_devno = 0;
         *ret_inode = 0;